Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-09-2024 05:41

General

  • Target

    bot.py

  • Size

    23KB

  • MD5

    6e3b26579726eff7e4431a51c75d8049

  • SHA1

    eb251ba4f1a52034aba27c00663cb06f3af884bb

  • SHA256

    cb984b8581341a9df204bf5ee3ae626790eaa7fb8f2b78ffc4f99865713848af

  • SHA512

    d36e864b3470c9f6446011f226366f498f621ccdb7d3695e76faa44b0679b7f45b62c4eb0354b18511f3f7077a65f3263668397fe0a607d05b55d10fdd51f59c

  • SSDEEP

    384:3Ll9Z8xCmXW1CtWBCEmtO3oo5XqrXMQuYWjUdG4K8ORgOOOOOi7gOoYWj+gOOdvN:3U+hBUtEoo5XqrXMAWjUQ4K8ygOOOOOv

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\bot.py
    1⤵
    • Modifies registry class
    PID:2224
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads